Skip to main content

White hat hackers infect Canon DSLR camera with ransomware y

In July this year, in-depth research into cybercrime and online threats revealed that in 2018, ransomware-type attacks caused $8 billion in damages. It is believed that ransomware attacks will grow to cost $20 billion in 2021.
To put the upcoming risk in a real-life scenario, the IT security researchers at Check Point have detailed a set of vulnerabilities in Canon DSLR camera which if exploited can infect DSLR cameras with ransomware. 
In a ransomware attack, attackers can not only take over the targeted device but also lock your files and demand ransom money. For instance, the infamous WannaCry ransomware attack on the NHS’s computer system in the United Kingdom.
In a blog post published by Check Point, researchers have demonstrated how malicious hackers can remotely infect Canon DSLR camera with malware and lockout user from accessing their personal data including private photos and video files which can be a highly lucrative target for cybercriminals.
According to Check Point’s researcher Eyal Itkin, since the use of Internet-connected devices is surging, companies including digital camera manufacturers like Conan have introduced DSLR models capable of establishing a connection with WiFi spots to transfer files to the computer with the help of standardized Picture Transfer Protocol (PTP).
Previously, file transfer was only possible with the help of USB. Itkin noted that PTP is an unauthenticated protocol and any vulnerability in the protocol can be easily exploited over WiFi. Additionally, an attacker can compromise a vulnerable WiFi access point and exploit it at a “tourist attraction” to carry out the attack.
Full list of vulnerabilities exploited by researchers is as follow:
  • CVE-2019-5994 – Buffer Overflow in SendObjectInfo – 0x100C
  • CVE-2019-5998 – Buffer Overflow in NotifyBtStatus – 0x91F9
  • CVE-2019-5999– Buffer Overflow in BLERequest – 0x914C
  • CVE-2019-6000– Buffer Overflow in SendHostInfo – 0x91E4
  • CVE-2019-6001– Buffer Overflow in SetAdapterBatteryReport – 0x91FD
  • CVE-2019-5995 – Silent malicious firmware update
In a video, Itkin demonstrated infecting a Canon E0S 80D model with malware that ended up encrypting photo files on the device’s SD card with the following note on the screen:
Your pictures have been encrypted! We are White hat hackers, don’t worry. A Malicious actor would have taken over your camera, encrypting all of your images for ransom. To stay protected, update the firmware of your camera.
A full preview of the ransomware note is available below:
White hat hackers infect Canon DSLR camera with ransomware
Image credit: Check Point
In usual circumstances, the IT security community encourages users to backup their data to avoid being blackmailed by cybercriminals into paying large ransom payments, however, in this case, backup is no bueno since attackers have already access to your highly personal photos and there is no way out other than paying the ransom with no guarantees on misuse of your data.
“During our research, we found multiple critical vulnerabilities in the Picture Transfer Protocol as implemented by Canon. Although the tested implementation contains many proprietary commands, the protocol is standardized, and is embedded in other cameras. Based on our results, we believe that similar vulnerabilities can be found in the PTP implementations of other vendors as well,” wrote Itkin"
The good news is that thanks to Check Point, Canon has already issued a security advisory and a firmware patch addressing the vulnerability. However, researchers believe similar vulnerabilities can be found in the PTP implementations of other vendors as well since the protocol is standardized, and is embedded in other cameras.

Comments

Popular posts from this blog

List Of Sql Infected Sites-HACKEREAD

SQL injection  is a  code injection  technique, used to  attack  data-driven applications, in which malicious  SQL  statements are inserted into an entry field for execution (e.g. to dump the database contents to the attacker).  SQL injection must exploit a  security vulnerability  in an application's software, for example, when user input is either incorrectly filtered for  string literal   escape characters  embedded in SQL statements or user input is not  strongly typed  and unexpectedly executed. SQL injection is mostly known as an attack  vector  for websites but can be used to attack any type of SQL database. List of SQL Infected sites:  http://www.genhound.co.uk/source.php?id=477 http://www.lcoastpress.com/journal.php?id=8 http://www.travellers-tales.co.uk/travelJournal.php?id=42 http://www.arrowvalves.co.uk/content.php?id=8 http://www.reaplasrack.co.uk/content.php?id=129 http://www.arrowval...

Google dork list for XSS (Cross- site scripting)-2020

GOOGLE DORK LIST FOR Cross-site scripting -2020 Google Dorks  its also known as google query ,List “Google Hacking” is mainly referred to pull the sensitive information from Google using advanced search terms that help users to search the index of a specific website, specific file type and some interesting information from unsecured Websites. Google Dorks list  2020 can uncover some incredible information such as email addresses and lists, login credentials, sensitive files, website vulnerabilities, and even financial information (e.g. payment card data). Here you can see an example to understand how  Google Darks   password  used by hackers to gain sensitive information from specific websites. You can also use for Exploit DB site to give you according to you Search state. https://www.exploit-db.com/ “ inurl: domain/ ” “ additional dorks A hacker would simply use in the desired parameters as follows: inurl = the URL of a site you want...

Popular Android Zombie game phish users to steal Gmail credentials

The app made its way to Google Play Store was also found phishing users for Facebook credentials. Scary Granny ZOMBY Mod: The Horror Game 2019 is the latest game on Google Play Store that is condemned by the digital security fraternity for sneakily stealing personal data from unsuspecting users. The game, which has been downloaded for over 50,000 times, was available for Android devices making Android users its primary target. The malicious app attempts to collect sensitive information such as Facebook and Gmail login credentials. The malicious activities of Scary Granny ZOMBY Mod were detected by the mobile security firm Wandera. The company found out that the app asks users to enter their Gmail or other Google account credentials, which are then used for collecting private data of the user by hijacking the account –  All of this happens, unsurprisingly, without alerting the user. Gmail phishing page on the supposed gaming app (Screenshot: Wandera) Rese...